{"id":13,"date":"2023-01-27T14:26:25","date_gmt":"2023-01-27T14:26:25","guid":{"rendered":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/?page_id=13"},"modified":"2023-02-06T15:31:24","modified_gmt":"2023-02-06T15:31:24","slug":"data-engineering","status":"publish","type":"page","link":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/data-engineering\/","title":{"rendered":"Data Engineering"},"content":{"rendered":"
[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00ffd8 0%|#0029e2 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-18.png” parallax=”on” custom_padding=”10vw||” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_font=”Overpass|900|||||||” header_font_size=”84px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-06-1.png” align=”right” _builder_version=”4.16″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-10vw|0vw||” custom_margin_tablet=”-2vw|0vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#ffffff” next_background_color=”#ffffff” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#004183 0%|#001f4c 100%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” custom_margin=”||22vw|||” custom_padding=”24vw||8vw||false|” top_divider_style=”slant” top_divider_height=”27vw” top_divider_flip=”horizontal” bottom_divider_style=”slant” bottom_divider_height=”27vw” bottom_divider_flip=”horizontal” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ max_width=”800px” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”Overpass|300|||||||” text_font_size=”17px” text_line_height=”1.8em” header_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”Overpass|600|||||||” header_3_text_color=”#00b4ff” header_3_font_size=”30px” header_3_line_height=”1.2em” text_orientation=”center” background_layout=”dark” custom_margin=”||” custom_padding=”|||||” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_tablet=”” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”on|phone” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
DATA ENGINEERING AT AV TCHNOLOGIES<\/p>\n<\/div>\n<\/div>\n
A data engineering consulting firm specializes in helping businesses and startups develop and maintain efficient systems for storing, processing, and analyzing large amounts of data. They can assist with tasks such as data warehousing, data pipeline design and implementation, data quality assurance, and performance optimization.<\/p>\n
Here is some sample content that could be used on a website for a data engineering consulting firm:<\/p>\n
Welcome to our Data Engineering Consulting firm! We\u2019re here to help businesses and startups achieve operational excellence through the effective use of data. Our team of experienced data engineers and architects have extensive experience designing and building robust data infrastructure that can handle the demands of even the most data-intensive applications.<\/p>\n
We offer a wide range of services to meet the unique needs of each of our clients, including:<\/p>\n
Our goal is to help you unlock the full potential of your data by providing the data infrastructure you need to support your business objectives. Contact us today to learn more about how we can help your organization achieve operational excellence through data.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.16″ locked=”off” global_colors_info=”{}”][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|240px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Online Stores” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-icon-40.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|160px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Health Care” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-icon-41.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” body_link_font=”|600|||||||” body_link_text_color=”#00b4ff” text_orientation=”center” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|80px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|tablet” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|tablet” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Government” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-icon-31.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” body_link_font=”|600|||||||” body_link_text_color=”#00b4ff” text_orientation=”center” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.16″ background_color=”#ffffff” custom_padding=”50px|50px|50px|50px|true|true” custom_padding_tablet=”” custom_padding_phone=”|20px||20px||true” custom_padding_last_edited=”on|phone” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” global_colors_info=”{}”][et_pb_blurb title=”Software” image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-icon-13.png” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#3122b2 0%|#00ffd8 100%” background_color_gradient_start=”#3122b2″ background_color_gradient_end=”#00ffd8″ background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-17.png” z_index=”10″ overflow-x=”visible” overflow-y=”visible” custom_padding=”||10vw|||” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ make_equal=”on” _builder_version=”4.16″ background_color=”#ffffff” custom_margin=”-146px|auto|-2px|auto||” custom_padding=”0px||0px||true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”40px” box_shadow_blur=”60px” box_shadow_spread=”-8px” box_shadow_color=”rgba(10,45,97,0.48)” locked=”off” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”60px|40px|60px|40px|true|true” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_blurb title=”(805)-768-4855″ use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.18.0″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ icon_font_size=”24px” locked=”off” global_colors_info=”{}” sticky_enabled=”0″][\/et_pb_blurb][et_pb_blurb title=”1883 Fox Springs Cir
\nNewbury Park, CA 91320 USA
\n” use_icon=”on” font_icon=”||divi||400″ icon_color=”#006ac1″ icon_placement=”left” image_icon_width=”24px” _builder_version=”4.16″ header_font=”Overpass|900|||||||” header_line_height=”1.4em” body_font=”Overpass|300|||||||” body_line_height=”1.8em” text_orientation=”center” icon_font_size=”24px” locked=”off” global_colors_info=”{}”][\/et_pb_blurb][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#00f6ff 0%|#00ffbf 100%” background_color_gradient_start=”#00f6ff” background_color_gradient_end=”#00ffbf” background_image=”http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/wp-content\/uploads\/2023\/01\/cyber-security-010-1.png” background_size=”contain” background_position=”bottom_left” transform_translate_linked=”off” custom_padding=”60px|40px|60px|20%|true” custom_padding_tablet=”80px|||40px” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” background_last_edited=”on|desktop” background_image_tablet=”http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png” background_enable_image_tablet=”on” background_position_tablet=”top_left” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” header_2_font=”Overpass|900|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” text_orientation=”center” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” text_text_align=”center” locked=”off” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ text_font=”Overpass|300|||||||” text_text_color=”#0a2d61″ text_font_size=”17px” text_line_height=”1.8em” text_orientation=”center” hover_enabled=”0″ text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” sticky_enabled=”0″][\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"
Data Engineering DATA ENGINEERING AT AV TCHNOLOGIES Data Engineering A data engineering consulting firm specializes in helping businesses and startups develop and maintain efficient systems for storing, processing, and analyzing large amounts of data. They can assist with tasks such as data warehousing, data pipeline design and implementation, data quality assurance, and performance optimization. Here […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/pages\/13"}],"collection":[{"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":6,"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":151,"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions\/151"}],"wp:attachment":[{"href":"http:\/\/ec2-44-198-123-89.compute-1.amazonaws.com\/index.php\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}